Authentication & authorization News
May 20, 2016
Rule 41 changes face bipartisan opposition in Senate with the Wyden-Paul bill to rein in the expansion of authority to let the government hack unlimited numbers of devices with a single warrant.
February 19, 2016
Securing AWS starts with knowing what mistakes to avoid. So, to get off on the right foot, learn from these cautionary tales of common AWS security blunders.
January 20, 2016
New surveys from Kaseya and Clutch indicate continuing demand for managed services and suggest companies offering a wider range of services may see the highest growth.
August 14, 2015
There are a number of paths to enterprise mobility, and in many cases, EMM takes a backseat to apps.
Authentication & authorization Get Started
Bring yourself up to speed with our introductory content
Enterprises need to be ready to act in the face of security incidents and cyberattacks. Expert Peter Sullivan outlines seven elements of proper cybersecurity readiness. Continue Reading
Spotlight article: Shon Harris explains the main concepts in the CISSP domain on telecommunications and networking, including network protocols, extension technologies and more. Continue Reading
We want to lock down data moving between EC2 instances and EBS volumes. What security and encryption options are available in Amazon Elastic Block Store? Continue Reading
Evaluate Authentication & authorization Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
AWS has won over many customers with its broad range of products, but security remains a primary concern for companies migrating to the cloud. It's important to secure your cloud from the start. Continue Reading
Citrix's relationship with Microsoft grew closer at Synergy 2016 -- which is no surprise given that CEO Kirill Tatarinov used to work there -- but it also touted several other product updates and strategic alliances. Continue Reading
This Security School examines how security professionals should consider updating and adapting their IAM framework to work with emerging technologies. Continue Reading
Manage Authentication & authorization
Learn to apply best practices and optimize your operations.
Most of the pivotal changes in identity and access management, or IAM, were discussed and developed at least ten years ago. Deployment of advanced IAM security technology has been glacial in comparison to most other security technologies because of its unavoidable complexity and its inherent intertwining with virtually every aspect of corporate IT. What's changed in recent years is that some of the use cases that push toward IAM concepts like federation and cloud-based identity stores have picked up considerable steam.
In this three-part technical guide, we consider how enterprise IAM strategy needs to adapt so that companies can cope securely with paradigm-changing technology like cloud services, software-defined everything and the internet of things. Readers of this guide to IAM security today will learn how IAM strategy and architecture have evolved and how corporations must adapt their systems if they are to employ identity and access management effectively and safely through the next decade.Continue Reading
Aging identity and access management tools, and technical innovations like the internet of things, make it imperative that you update your enterprise IAM policy now. Here's how. Continue Reading
Developers can take different approaches to automatically spin up and shut down EC2 instances, either on a schedule or in response to load. Continue Reading
Problem Solve Authentication & authorization Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
From compliance to encryption, there are many boxes an organization needs check to ensure its public cloud is secure. Use this flow chart to kick start that critical process. Continue Reading
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security. Continue Reading
A new generation of workers has brought mobile privacy to the forefront of security conversations. Organizations need to create privacy policies now or risk losing out on valuable employees. Continue Reading